Securing Mobile Ad-Hoc Network by Discovering and Verifying Neighborhood
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015

Securing Mobile Ad-Hoc Network by Discovering and Verifying Neighborhood

Pranita D. Pandit, Prof. Pranjali Deshmukh

-In a mobile ad hoc network without knowing neighbor node position which makes a chance to attackers to easily enter into the network. A growing number of ad hoc networking protocols and location-aware services require that mobile nodes learn the position of their neighbors. However, such a process can be easily abused or disrupted by adversarial nodes. In absence of a priori trusted nodes, the discovery and verification of neighbor positions presents challenges that have been scarcely investigated. Providing this protocol to a wireless ad hoc network makes it to be more secure. Results show that our protocol can determine attacks under the best possible conditions for the adversaries, with minimal false positive rates. Secure Neighbor Discovery which offers a measure of protection by allowing participating mobile nodes to securely determine if they are neighbors. Neighbor position verification designed for spontaneous ad hoc environments, and, as such, it does not rely on the presence of a trusted infrastructure or of a priori trustworthy nodes. The paper includes result of NPV protocols.

Keywords: Mobile ad hoc networks, Neighbor discovery, Neighbor position verification

Edition: Volume 4 Issue 4, April 2015

Pages: 2391 - 2394

Share this Article

How to Cite this Article?

Pranita D. Pandit, Prof. Pranjali Deshmukh, "Securing Mobile Ad-Hoc Network by Discovering and Verifying Neighborhood", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=18041504, Volume 4 Issue 4, April 2015, 2391 - 2394

99 PDF Views | 82 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Mobile ad hoc networks'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana, Sandeep Gupta

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2302 - 2305

Detection and Prevention of Cooperative Wormhole Attack in a MANET

Anuradha T, Padmashree S. Shedbalkar

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 74 - 79

Mobile Ad hoc Network

R. Marutha Veni, R. Latha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1803 - 1808

Performance Comparison of DSDV, OLSR, DSR and AODV MANET Routing Protocols in Traffic Conditions

Katroth Balakrishna Maruthiram, Kare Suresh Babu

Share this Article

Similar Articles with Keyword 'Neighbor discovery'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2391 - 2394

Securing Mobile Ad-Hoc Network by Discovering and Verifying Neighborhood

Pranita D. Pandit, Prof. Pranjali Deshmukh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1265 - 1269

Efficient Route Discovery by Selecting Link Stability Neighbors in MANET

R. Maruthaveni, R. Latha

Share this Article
Top